Skip to content

feat: add programmatic vault secret management#52

Closed
lostmygithubaccount wants to merge 1 commit intomainfrom
cody/ws-secrets1
Closed

feat: add programmatic vault secret management#52
lostmygithubaccount wants to merge 1 commit intomainfrom
cody/ws-secrets1

Conversation

@lostmygithubaccount
Copy link
Copy Markdown
Contributor

Closes #33

Problem

Users can only manage vault secrets through the Ascend UI. There's no way to create, update, or delete secrets programmatically, blocking automation and CI/CD workflows.

Summary

Adds CRUD operations for vault secrets across all layers, wrapping the existing Instance API vault/secret endpoints (managed AWS vaults).

Programmatic vault secret management (4a654c4)

  • Add VaultSecret, SshPublicKey, SecretStatus, SecretValue models to core SDK
  • Extend HTTP request() helper to support PUT and DELETE methods
  • Add 7 client methods: list_secrets, get_secret, create_secret, update_secret, set_secret (create-or-update), delete_secret, get_secret_ssh_public_key
  • New CLI secret command group with subcommands: list, get, set, delete, get-ssh-public-key
  • set supports --value, --from-file, --generate-ssh-key, or piped stdin
  • All commands accept --environment for environment-scoped secrets
  • 5 new MCP tools: list_secrets, get_secret, set_secret, delete_secret, get_secret_ssh_public_key
  • Python SDK: list_secrets(), get_secret(), set_secret(), delete_secret(), get_secret_ssh_public_key()
  • JavaScript SDK: listSecrets(), getSecret(), setSecret(), deleteSecret(), getSecretSshPublicKey()
  • 11 new tests (CLI parsing, MCP mock server)
  • Updated AGENTS.md, skill-cli.md with new commands and tools

🤖 Generated with Claude Code

Add CRUD operations for vault secrets across all layers: Rust SDK,
CLI, MCP server, Python SDK, and JavaScript SDK. Wraps the existing
Instance API vault/secret endpoints (managed AWS vaults).

CLI commands: secret list, get, set, delete, get-ssh-public-key.
Set supports --value, --from-file, --generate-ssh-key, or stdin.
All commands accept --environment for environment-scoped secrets.

MCP tools: list_secrets, get_secret, set_secret, delete_secret,
get_secret_ssh_public_key.

Closes #33

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

programmatic vaults/secrets

1 participant